CVE-2024-6477
📋 TL;DR
The UsersWP WordPress plugin before version 1.2.12 generates predictable filenames for admin export files, allowing unauthenticated attackers to download these files and access sensitive user information including IP addresses, usernames, and email addresses. This affects all WordPress sites running vulnerable versions of the UsersWP plugin.
💻 Affected Systems
- UsersWP WordPress Plugin
📦 What is this software?
Userswp by Ayecode
⚠️ Risk & Real-World Impact
Worst Case
Attackers download all exported user data containing PII, leading to data breaches, credential harvesting, and potential follow-on attacks using stolen information.
Likely Case
Unauthenticated attackers access exported user lists containing email addresses and usernames, enabling targeted phishing campaigns and reconnaissance.
If Mitigated
No data exposure occurs due to proper access controls, file permissions, or timely patching.
🎯 Exploit Status
Exploitation requires guessing predictable filenames; automated tools can easily brute-force common patterns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.12
Vendor Advisory: https://wpscan.com/vulnerability/346c855a-4d42-4a87-aac9-e5bfc2242b16/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find UsersWP plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.2.12+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Delete existing export files
linuxManually locate and delete any existing export files generated by the plugin to remove exposed data.
find /path/to/wordpress -name "*export*" -type f -delete
Restrict access to uploads directory
allAdd .htaccess rules to block direct access to export files in wp-content/uploads directory.
Add to .htaccess: Order Allow,Deny
Deny from all
🧯 If You Can't Patch
- Disable the UsersWP plugin immediately until patching is possible.
- Implement web application firewall rules to block requests to predictable export file patterns.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for UsersWP version. If version is below 1.2.12, system is vulnerable.
Check Version:
wp plugin list --name=userswp --field=version
Verify Fix Applied:
Confirm UsersWP plugin version is 1.2.12 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP 200 responses to requests for predictable filenames like *export*.csv in uploads directory
- Unusual download patterns from /wp-content/uploads/ directory
Network Indicators:
- GET requests to /wp-content/uploads/*export* from unauthenticated IPs
SIEM Query:
source="web_logs" AND uri_path="/wp-content/uploads/" AND uri_query="*export*" AND response_code=200